-
Posted On Uncategorized
Beware of ENS Email Phishing: Crypto Scammers Target Ethereum Name Service Owners
Crypto scammers have devised a new tactic to deceive owners of Ethereum Name Service (ENS) domains, commonly recognized by their…
-
Posted On Uncategorized
The LockBit Takedown: Why Ransom Payments Are a No-win Scenario
The cybersecurity community was rocked by a massive event when LockBit Ransomware once a powerful domain suddenly changed, displaying flags…
-
Posted On Uncategorized
U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the…
-
Posted On Uncategorized
Critical infrastructure attacks aren’t all the same: Why it matters to CISOs
Cyberattacks against critical infrastructure are always big news, but recent headlines have once again thrust the threat faced by Western…
-
Posted On Uncategorized
LockBit ransomware operations seized by law enforcement in ‘Operation Cronos’
Several operations of the notorious ransomware gang LockBit have been seized by global law enforcement authorities in a coordinated takeover…
-
Posted On Uncategorized
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers
Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that…
-
Posted On Uncategorized
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS
The China-linked threat actor known as Mustang Panda has targeted various Asian countries using a variant of the PlugX (aka…
-
Posted On Uncategorized
6 Ways to Simplify SaaS Identity Governance
With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to…